Latest CVE Feed
- 
                                
                                
8.8
HIGHCVE-2025-62933
Cross-Site Request Forgery (CSRF) vulnerability in Prakash Awesome Testimonials awesome-testimonials allows Stored XSS.This issue affects Awesome Testimonials: from n/a through <= 2.2.1.... Read more
Affected Products :- Published: Oct. 27, 2025
 - Modified: Oct. 28, 2025
 - Vuln Type: Cross-Site Request Forgery
 
 - 
                                
                                
8.8
HIGHCVE-2025-21064
Improper authentication in Smart Switch prior to version 3.7.66.6 allows adjacent attackers to access transferring data.... Read more
Affected Products : smart_switch- Published: Oct. 10, 2025
 - Modified: Oct. 28, 2025
 - Vuln Type: Authentication
 
 - 
                                
                                
8.8
HIGHCVE-2025-10293
The Keyy Two Factor Authentication (like Clef) plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.2.3. This is due to the plugin not properly validating a user's identity associated with... Read more
Affected Products :- Published: Oct. 15, 2025
 - Modified: Oct. 16, 2025
 - Vuln Type: Authentication
 
 - 
                                
                                
8.8
HIGHCVE-2025-62891
Cross-Site Request Forgery (CSRF) vulnerability in Jory Hogeveen Off-Canvas Sidebars & Menus (Slidebars) off-canvas-sidebars allows Cross Site Request Forgery.This issue affects Off-Canvas Sidebars & Menus (Slidebars): from n/a through <= 0.5.8.5.... Read more
Affected Products :- Published: Oct. 27, 2025
 - Modified: Oct. 28, 2025
 - Vuln Type: Cross-Site Request Forgery
 
 - 
                                
                                
8.8
HIGHCVE-2025-62697
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') vulnerability in The Wikimedia Foundation Mediawiki - LanguageSelector Extension allows Code Injection.This issue affects Mediawiki - LanguageSelector Exten... Read more
Affected Products :- Published: Oct. 20, 2025
 - Modified: Oct. 21, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
8.8
HIGHCVE-2025-62007
Incorrect Privilege Assignment vulnerability in bPlugins Voice Feedback voice-feedback allows Privilege Escalation.This issue affects Voice Feedback: from n/a through <= 1.0.3.... Read more
Affected Products :- Published: Oct. 22, 2025
 - Modified: Oct. 24, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
8.8
HIGHCVE-2025-60228
Deserialization of Untrusted Data vulnerability in designthemes Knowledge Base kbase allows Object Injection.This issue affects Knowledge Base: from n/a through <= 2.9.... Read more
Affected Products :- Published: Oct. 22, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
8.8
HIGHCVE-2025-49949
Missing Authorization vulnerability in templazee Templazee templazee allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Templazee: from n/a through <= 1.0.2.... Read more
Affected Products :- Published: Oct. 22, 2025
 - Modified: Oct. 23, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
8.8
HIGHCVE-2025-62954
Missing Authorization vulnerability in Codeinwp Revive Old Posts tweet-old-post allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Revive Old Posts: from n/a through <= 9.3.3.... Read more
Affected Products : revive_old_posts- Published: Oct. 27, 2025
 - Modified: Oct. 28, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
8.8
HIGHCVE-2025-62889
Missing Authorization vulnerability in KingAddons.com King Addons for Elementor king-addons allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects King Addons for Elementor: from n/a through <= 51.1.37.... Read more
Affected Products :- Published: Oct. 27, 2025
 - Modified: Oct. 28, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
8.8
HIGHCVE-2025-62946
Missing Authorization vulnerability in everestthemes Everest Backup everest-backup allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Everest Backup: from n/a through <= 2.3.8.... Read more
Affected Products : everest_backup- Published: Oct. 27, 2025
 - Modified: Oct. 28, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
8.8
HIGHCVE-2025-62953
Missing Authorization vulnerability in nanbu Welcart e-Commerce usc-e-shop allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Welcart e-Commerce: from n/a through <= 2.11.24.... Read more
Affected Products : welcart_e-commerce- Published: Oct. 27, 2025
 - Modified: Oct. 28, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
8.8
HIGHCVE-2025-62890
Cross-Site Request Forgery (CSRF) vulnerability in Premmerce Premmerce Brands for WooCommerce premmerce-woocommerce-brands allows Cross Site Request Forgery.This issue affects Premmerce Brands for WooCommerce: from n/a through <= 1.2.13.... Read more
Affected Products :- Published: Oct. 27, 2025
 - Modified: Oct. 28, 2025
 - Vuln Type: Cross-Site Request Forgery
 
 - 
                                
                                
8.8
HIGHCVE-2025-60234
Deserialization of Untrusted Data vulnerability in designthemes Single Property single-property allows Object Injection.This issue affects Single Property: from n/a through <= 2.8.... Read more
Affected Products :- Published: Oct. 22, 2025
 - Modified: Oct. 24, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
8.8
HIGHCVE-2025-6038
The Lisfinity Core - Lisfinity Core plugin used for pebas® Lisfinity WordPress theme plugin for WordPress is vulnerable to privilege escalation via password update in all versions up to, and including, 1.4.0. This is due to the plugin not properly validat... Read more
Affected Products :- Published: Oct. 09, 2025
 - Modified: Oct. 09, 2025
 - Vuln Type: Authentication
 
 - 
                                
                                
8.8
HIGHCVE-2025-8093
Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal Authenticator Login allows Authentication Bypass.This issue affects Authenticator Login: from 0.0.0 before 2.1.8.... Read more
Affected Products : authenticator_login- Published: Oct. 10, 2025
 - Modified: Oct. 15, 2025
 - Vuln Type: Authentication
 
 - 
                                
                                
8.8
HIGHCVE-2025-54968
An issue was discovered in BAE SOCET GXP before 4.6.0.2. The SOCET GXP Job Service does not require authentication. In some configurations, this may allow remote users to submit jobs, or local users to submit jobs that will execute with the permissions of... Read more
Affected Products : socet_gxp- Published: Oct. 27, 2025
 - Modified: Oct. 31, 2025
 - Vuln Type: Authentication
 
 - 
                                
                                
8.8
HIGHCVE-2025-11619
Improper certificate validation when connecting to gateways in Devolutions Server 2025.3.2 and earlier allows attackers in MitM position to intercept traffic.... Read more
Affected Products : devolutions_server- Published: Oct. 15, 2025
 - Modified: Oct. 28, 2025
 - Vuln Type: Misconfiguration
 
 - 
                                
                                
8.8
HIGHCVE-2025-64140
Jenkins Azure CLI Plugin 0.9 and earlier does not restrict which commands it executes on the Jenkins controller, allowing attackers with Item/Configure permission to execute arbitrary shell commands.... Read more
Affected Products :- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
8.8
HIGHCVE-2025-11746
The XStore theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 9.5.4 via theet_ajax_required_plugins_popup() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, ... Read more
Affected Products : xstore- Published: Oct. 15, 2025
 - Modified: Oct. 16, 2025
 - Vuln Type: Path Traversal